Computer Networking Which of the following is the decimal and hexadecimal equivalents of the binary number 10011101? 185, 0xB9 159, 0x9F 157, 0x9D 155, 0x9B 185, 0xB9 159, 0x9F 157, 0x9D 155, 0x9B ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Business meeting and conferences can be held by linking distantly located people through a computer network. Not only the participants exchange information but are able to see each other. What is it called? Teletalking Telemailing Teleconferencing Telemeeting None of these Teletalking Telemailing Teleconferencing Telemeeting None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Frames from one LAN can be transmitted to another LAN via the device Router Bridge Repeater None of these Modem Router Bridge Repeater None of these Modem ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The difference between a multiplexer and a statistical multiplexer is Statistical multiplexers need buffers while multiplexers do not need buffers Multiplexers use Time Division Multiplexing (TDM) while statistical multiplexers use Frequency Division Multiplexing (FDM) None of these Multiplexers often waste the output link capacity while statistical multiplexers optimize its use Multiplexer use X.25 protocol, while statistical multiplexers use the Aloha protocol Statistical multiplexers need buffers while multiplexers do not need buffers Multiplexers use Time Division Multiplexing (TDM) while statistical multiplexers use Frequency Division Multiplexing (FDM) None of these Multiplexers often waste the output link capacity while statistical multiplexers optimize its use Multiplexer use X.25 protocol, while statistical multiplexers use the Aloha protocol ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to allow one host to be permitted to attach dynamically to each switch interface. Which two commands must you configure on your catalyst switch to meet this policy?1. Switch (config-if) # ip access-group 102. Switch (config-if) # switchport port-security maximum 13. Switch (config) # access-list 10 permit ip host 14. Switch (config-if) # switchport port-security violation shutdown5. Switch (config) # mac-address-table secure 1 and 3 4 and 5 2, 3 and 5 2 and 4 1 and 3 4 and 5 2, 3 and 5 2 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the maximum number of IP addresses that can be assigned to hosts on a local subnet that uses the 255.255.255.224 subnet mask? 15 16 14 30 15 16 14 30 ANSWER DOWNLOAD EXAMIANS APP